Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 05:07
Static task
static1
Behavioral task
behavioral1
Sample
06cef5b203f84d4964057729eb65df22.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06cef5b203f84d4964057729eb65df22.exe
Resource
win10v2004-20231215-en
General
-
Target
06cef5b203f84d4964057729eb65df22.exe
-
Size
1.3MB
-
MD5
06cef5b203f84d4964057729eb65df22
-
SHA1
bc5ae6068a3330026850e1d499f460874d5e1485
-
SHA256
12cab74f91eabd1820fad59437c2e53245171097edb50959cb2e8f40d1575a87
-
SHA512
51cbb9327ac2a2023c22795b64c0fa3f8bdc8f1daf121ec054ab7294b596bdd45649ca2d0d615c23736be055e146090c611f64521e42128a1e936a6d03c5a511
-
SSDEEP
24576:jK6fxaOhc2dC3Rfzy41rWibAiCEydknBds0a0m1lK8q:m6JpC3RLy41aibAiCE1Ps0a1LKR
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 06cef5b203f84d4964057729eb65df22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 06cef5b203f84d4964057729eb65df22.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 06cef5b203f84d4964057729eb65df22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 06cef5b203f84d4964057729eb65df22.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 776 set thread context of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Internet Explorer\Main 06cef5b203f84d4964057729eb65df22.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2388 06cef5b203f84d4964057729eb65df22.exe 2388 06cef5b203f84d4964057729eb65df22.exe 2388 06cef5b203f84d4964057729eb65df22.exe 2388 06cef5b203f84d4964057729eb65df22.exe 2388 06cef5b203f84d4964057729eb65df22.exe 2388 06cef5b203f84d4964057729eb65df22.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29 PID 776 wrote to memory of 2388 776 06cef5b203f84d4964057729eb65df22.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\06cef5b203f84d4964057729eb65df22.exe"C:\Users\Admin\AppData\Local\Temp\06cef5b203f84d4964057729eb65df22.exe"1⤵
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\06cef5b203f84d4964057729eb65df22.exe"C:\Users\Admin\AppData\Local\Temp\06cef5b203f84d4964057729eb65df22.exe" Track="0001001000"2⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2388
-